☆34Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for decap
Users that are interested in decap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Jun 24, 2022Updated 3 years ago
- A network logging tool that logs per process activities☆32Jun 13, 2023Updated 2 years ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆17Jan 28, 2026Updated 3 months ago
- ☆17Aug 27, 2022Updated 3 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Simple and efficient file shredding☆14Sep 23, 2019Updated 6 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- Incident Response - Fast suspicious file finder☆256Jan 24, 2026Updated 3 months ago
- ☆12Jul 15, 2022Updated 3 years ago
- Collect information of Windows PC when doing incident response☆252Jun 5, 2023Updated 2 years ago
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Burp Report Generator☆11Mar 1, 2025Updated last year
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Apr 2, 2026Updated last month
- ☆25Jul 12, 2023Updated 2 years ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆68Apr 23, 2026Updated last week
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 3 months ago
- Small project to facilitate creation of .lnk payloads☆82Nov 18, 2022Updated 3 years ago
- Resources To Learn And Understand SIGMA Rules☆185Feb 14, 2023Updated 3 years ago
- A general-purpose, high-interaction honeypot that blends old-school Linux internals with new-school containerization to spawn a new trap …☆27Feb 12, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- ☆28Oct 15, 2025Updated 6 months ago
- YARA rule analyzer to improve rule quality and performance☆113Jan 18, 2026Updated 3 months ago
- https://pinkdraconian.gitbook.io/methodology/☆14Aug 24, 2021Updated 4 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- Python script that use AbuseIPDB API to bulk check IP reputation for threats. Supports both command line and GUI interfaces. Input option…☆18Apr 11, 2025Updated last year
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- ☆46Jun 1, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- Multicopter UAV simulation for control/RL experiments.☆23Nov 11, 2023Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆256Oct 29, 2025Updated 6 months ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago